A program routine that destroys data when certain conditions are met; for example, it may reformat the hard disk or insert random bits into data files on a certain date or if a particular employee record is missing from the employee database. Many viruses are logic bombs because they deliver their payload after a specific latency or when a trigger event occurs. See virus, latency and payload.
Internal forms of malicious logic, which can also be propagated from one system to an-other, e.
External forms of malicious logic that operate from outside of the MedIS, e.
System profiles often employ digitally signed databases and may incorporate file system checks that bypass normal operating system facilities in order to detect the more sophisticated checksum aware malicious logic.